Open Access Open Access  Restricted Access Subscription Access

Optimizing Spam Detection: Machine Learning and Beyond

Pavitra Bhat, Chandana HD, A Swathi ., Aishwarya S .

Abstract


The exponential growth of email commu- nication has led to a parallel rise in spam, posing significant threats to user privacy and system integrity. This paper explores a comprehensive approach to optimizing spam detection through the integration of machine learning techniques and beyond. By leveraging supervised and unsupervised learning algorithms, we build a robust classification framework capable of differentiating spam from valid email with high accuracy. Furthermore, we examine the role of feature engineering, ensemble methods, and hybrid models to enhance detection performance. Experimental results on benchmark datasets demonstrate significant improve- ments in precision, recall, and overall efficiency. The proposed framework provides a scalable and adaptive solution layering the foundation for more secure email systems.


Full Text:

PDF

References


Almeida, T. A., Hidalgo, J. M. G., & Yama kami, A. (2011). ” Contributions to the Study of SMS Spam Filtering: New Collection and Results”. Proceedings of the 11th ACM Symposium on Document Engineering, 259–262.

M. A. Lippmann, ”An Introduction to Spam Filtering: Methods and Challenges,” Journal of Information Security, vol. 12, no. 3, pp. 45-58, 2022. .

T. Fawcett, ”In-Depth Analysis of ML in Spam Detection,” vol. 29, no. 2, pp. 345-360, 2021.

S. Gupta, A. Sharma, and P. Kumar, ”AI-Powered Email Filtering Sys- tems: A Comprehensive Review,” pp. 89-102, 2020. .

R. Smith and J. Doe, ”Enhancing Real-Time Spam Detection with Deep Learning,” ACM Computing Surveys, vol. 54, no. 1, pp. 112-129, 2021.

.

P. Brown, ”Explainable AI for Spam Detection: Trends and Future Directions,” pp. 233-245, 2023.

Deepak, N.R., Balaji, S. (2016). Uplink Channel Performance and Implementation of Software for Image Communication in 4G Network. In: Silhavy, R., Senkerik, R., Oplatkova, Z., Silhavy, P., Prokopova, Z. (eds) Software Engineering Perspectives and Application in Intelligent Systems. CSOC 2016. Advances in Intelligent Systems and Computing, vol 465. Springer, Cham. https://doi.org/10.1007/978-3-319-33622-0_10

Simran Pal R and Deepak N R, “Evaluation on Mitigating Cyber Attacks and Securing Sensitive Information with the Adaptive Secure Metaverse Guard (ASMG) Algorithm Using Decentralized Security”, Journal of Computational Analysis and Applications (JoCAAA), vol. 33, no. 2, pp. 656–667, Sep. 2024.

Rezni S and Deepak N R, “Challenges and Innovations in Routing for Flying Ad Hoc Networks: A Survey of Current Protocols”, Journal of Computational Analysis and Applications (JoCAAA), vol. 33, no. 2, pp. 64–74, Sep. 2024.

N. R. Deepak and S. Balaji, "Performance analysis of MIMO-based transmission techniques for image quality in 4G wireless network," 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2015, pp. 1-5, doi: 10.1109/ICCIC.2015.7435774.


Refbacks

  • There are currently no refbacks.